1Same test as rsa-pkcs1-sha1.pem, except the SPKI has been modified so the 2algorithm parameters are absent rather than NULL. 3 4This should fail because RFC 3279 says the parameters MUST be NULL. 5 6 7 8-----BEGIN PUBLIC KEY----- 9MIGdMAsGCSqGSIb3DQEBAQOBjQAwgYkCgYEApW5KDnAQF1iaUYfcfqhB0Vby7A42rVKkTf6x5h9 1062ZHYxRBW/+2xYrTA8oOhKoijlN/1JqtykcuzB86r/OCx39XNlQgJbVsri2311nHvY3fAkhyyPC 11cKcOJZjm/4nRnxBazC0/DLNfKSgOE4a29kxO8i4eHyDQzoz/siSb2aITcCAwEAAQ== 12-----END PUBLIC KEY----- 13 14$ openssl asn1parse -i < [PUBLIC KEY] 15 0:d=0 hl=3 l= 157 cons: SEQUENCE 16 3:d=1 hl=2 l= 11 cons: SEQUENCE 17 5:d=2 hl=2 l= 9 prim: OBJECT :rsaEncryption 18 16:d=1 hl=3 l= 141 prim: BIT STRING 19 20 21 22-----BEGIN ALGORITHM----- 23MA0GCSqGSIb3DQEBBQUA 24-----END ALGORITHM----- 25 26$ openssl asn1parse -i < [ALGORITHM] 27 0:d=0 hl=2 l= 13 cons: SEQUENCE 28 2:d=1 hl=2 l= 9 prim: OBJECT :sha1WithRSAEncryption 29 13:d=1 hl=2 l= 0 prim: NULL 30 31 32 33-----BEGIN DATA----- 34zch9oiPXht87ReC7vHITJtHuKvgGzDFUdcxvDZxm4bYjcdRc4jkuGskoRMMQEC8Vag2NUsH0xAu 35jqmUJV4bLdpdXplY7qVj+0LzJhOi1F6PV9RWyO4pB50qoZ2k/kN+wYabobfqu5kRywA5fIJRXKc 36vr538Gznjgj0CY+6QfnWGTwDF+i2DUtghKy0LSnjgIo7w3LYXjMRcPy/fMctC3HClmSLOk0Q9BY 37pXQgHqmJcqydE/Z6o/SI8QlNwKYKL0WvgJUbxMP0uM7k20mduCK7RtzMYt1CgFn0A== 38-----END DATA----- 39 40 41 42-----BEGIN SIGNATURE----- 43A4GBAGvDoGZWhCkwokfjDVhktNgZI2unxollhirX28TiSvKOhrtTHwM1i+X7dHd8YIb4UMrviT8 44Nb8wtDJHsATaTtOoAuAzUmqxOy1+JEa/lOa2kqPOCPR0T5HLRSQVHxlnHYX89JAh9228rcglhZ/ 45wJfKsY6aRY/LY0zc6O41iUxITX 46-----END SIGNATURE----- 47 48$ openssl asn1parse -i < [SIGNATURE] 49 0:d=0 hl=3 l= 129 prim: BIT STRING 50